Found: 39
Select item for more details and to access through your institution.
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.
- Published in:
- Requirements Engineering, 2011, v. 16, n. 1, p. 3, doi. 10.1007/s00766-010-0115-7
- By:
- Publication type:
- Article
Security Design with Investor Private Information.
- Published in:
- Journal of Finance (Wiley-Blackwell), 2007, v. 62, n. 6, p. 2587, doi. 10.1111/j.1540-6261.2007.01287.x
- By:
- Publication type:
- Article
Analysis of the Definition and Utility of Personal Health Records Using Q Methodology.
- Published in:
- Journal of Medical Internet Research, 2011, v. 13, n. 4, p. 5, doi. 10.2196/jmir.1781
- By:
- Publication type:
- Article
Reducing the Threat Levels for Accounting Information Systems.
- Published in:
- CPA Journal, 2007, v. 77, n. 5, p. 34
- By:
- Publication type:
- Article
Aligning Security Awareness with Information Systems Security Management.
- Published in:
- Journal of Information System Security, 2010, v. 6, n. 1, p. 36
- By:
- Publication type:
- Article
Elektronik Belgelerin Arşivlenmesinde Gerçekliğin ve Bütünlüğün Korunması.
- Published in:
- Information World / Bilgi Dünyası, 2011, v. 12, n. 1, p. 105, doi. 10.15612/bd.2011.224
- By:
- Publication type:
- Article
Researchers launch hunt for endangered data.
- Published in:
- Nature, 2010, v. 468, n. 7320, p. 17, doi. 10.1038/468017a
- By:
- Publication type:
- Article
MANAGEMENT OF INFORMATION SECURITY: CHALLENGES AND RESEARCH DIRECTIONS.
- Published in:
- Communications of the Association for Information Systems, 2007, v. 20, p. 958, doi. 10.17705/1CAIS.02057
- Publication type:
- Article
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7142170
- By:
- Publication type:
- Article
Managing Security: The Security Content Automation Protocol.
- Published in:
- IT Professional, 2011, v. 13, n. 1, p. 9, doi. 10.1109/MITP.2011.11
- By:
- Publication type:
- Article
From Ancient Fortress to Modern Cyberdefense.
- Published in:
- IT Professional, 2009, v. 11, n. 3, p. 22, doi. 10.1109/MITP.2009.48
- By:
- Publication type:
- Article
IMPROVING EMPLOYEES' COMPLIANCE THROUGH INFORMATION SYSTEMS SECURITY TRAINING: AN ACTION RESEARCH STUDY.
- Published in:
- MIS Quarterly, 2010, v. 34, n. 4, p. 767
- By:
- Publication type:
- Article
Understanding the Components of Information Privacy Threats for Location-Based Services.
- Published in:
- Journal of Information Systems, 2014, v. 28, n. 1, p. 227, doi. 10.2308/isys-50696
- By:
- Publication type:
- Article
Advances in trusted network computing.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Detection of the Security Vulnerabilities in Web Applications.
- Published in:
- Informatica Economica, 2009, v. 13, n. 1, p. 127
- By:
- Publication type:
- Article
V-Model Role Engineering.
- Published in:
- Informatica Economica, 2009, v. 13, n. 1, p. 38
- By:
- Publication type:
- Article
Security Management Convergence via SIM (Security Information Management)—A Requirements Perspective.
- Published in:
- Journal of Network & Systems Management, 2004, v. 12, n. 1, p. 137, doi. 10.1023/B:JONS.0000015702.05980.d2
- By:
- Publication type:
- Article
Opacity generalised to transition systems.
- Published in:
- International Journal of Information Security, 2008, v. 7, n. 6, p. 421, doi. 10.1007/s10207-008-0058-x
- By:
- Publication type:
- Article
An Investigation of the Factors Affecting the Security of Management Information System in Financial Institutions.
- Published in:
- IUP Journal of Systems Management, 2011, v. 9, n. 2, p. 7
- By:
- Publication type:
- Article
Accessibility, Security, and Accuracy in Statistical Databases: The Case for the Multiplicative Fixed Data Perturbation Approach.
- Published in:
- Management Science, 1995, v. 41, n. 9, p. 1549, doi. 10.1287/mnsc.41.9.1549
- By:
- Publication type:
- Article
DATA AT RISK.
- Published in:
- Internal Auditor, 2018, v. 75, n. 5, p. 72
- By:
- Publication type:
- Article
Software Patches More Vulnerable to Hackers.
- Published in:
- Financial Executive, 2005, v. 21, n. 2, p. 10
- By:
- Publication type:
- Article
A NEW CLASSIFICATION OF INFORMATION PROTECTION METHODS.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2013, v. 3, n. 2, p. 163
- By:
- Publication type:
- Article
OPTIMIZATION OF PARAMETERS FOR DEFENCE SYSTEMS IN DATA TRANSMISSION NETWORK.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2013, v. 3, n. 1, p. 69
- By:
- Publication type:
- Article
MATHEMATICAL MODEL OF SHIELDED DISTRIBUTED FILTER.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2013, v. 3, n. 1, p. 61
- By:
- Publication type:
- Article
AMALGAMS, COMPLETENESS OF DIAGRAMS AND SUB-OBJECTS OF SETS IN INFORMATION SECURITY SYSTEMS.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2013, v. 3, n. 1, p. 50
- By:
- Publication type:
- Article
Managing and Maintaining Electronic Content May Be Tricky, But Critical.
- Published in:
- Journal of Health Care Compliance, 2010, v. 12, n. 4, p. 55
- By:
- Publication type:
- Article
NEW TRENDS IN IT&C SECURITY EVALUATION.
- Published in:
- LESIJ - Lex ET Scientia International Journal, 2010, v. 17, n. 2, p. 281
- By:
- Publication type:
- Article
CONSIDERATIONS REGARDING THE PROTECTION OF CLASSIFIED INFORMATION IN ELECTRONIC FORMAT.
- Published in:
- LESIJ - Lex ET Scientia International Journal, 2010, v. 17, n. 2, p. 270
- By:
- Publication type:
- Article
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems.
- Published in:
- Information Systems Research, 2009, v. 20, n. 2, p. 198, doi. 10.1287/isre.1080.0180
- By:
- Publication type:
- Article
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.
- Published in:
- Information Systems Research, 2009, v. 20, n. 1, p. 79, doi. 10.1287/isre.1070.0160
- By:
- Publication type:
- Article
Effective IS Security: An Empirical Study.
- Published in:
- Information Systems Research, 1990, v. 1, n. 3, p. 255, doi. 10.1287/isre.1.3.255
- By:
- Publication type:
- Article
Effects of Team Collaboration on Sharing Information Security Advice: Insights from Network Analysis.
- Published in:
- Information Resources Management Journal, 2017, v. 30, n. 3, p. 58, doi. 10.4018/IRMJ.2017070104
- By:
- Publication type:
- Article
Metodología y gobierno de la gestión de riesgos de tecnologías de la información.
- Published in:
- Revista de Ingeniería, 2010, n. 31, p. 109, doi. 10.16924/riua.v0i31.217
- By:
- Publication type:
- Article
How to Secure Client Data.
- Published in:
- Journal of Financial Planning, 2009, p. 24
- By:
- Publication type:
- Article
Politica de Securitate a Informaţiilor în viziunea standardului ISO/IEC 27001:2005.
- Published in:
- Quality - Access to Success, 2009, v. 10, n. 11, p. 53
- By:
- Publication type:
- Article
Outsourcing Information Security: Contracting Issues and Security Implications.
- Published in:
- Management Science, 2014, v. 60, n. 3, p. 638, doi. 10.1287/mnsc.2013.1763
- By:
- Publication type:
- Article
IMPROVEMENT OF INFORMATION SECURITY CASES AND CLASSIFICATION SYSTEMS.
- Published in:
- European Science Review, 2018, n. 5/6, p. 86
- By:
- Publication type:
- Article
Look, Up in the Sky! It's a Bird...It's a Plane...It's a Cloud!
- Published in:
- Journal of Financial Service Professionals, 2012, v. 66, n. 6, p. 36
- By:
- Publication type:
- Article